Datasheet

9E0 - 100
Leading the way in IT testing and certification tools, www.testking.com
- 45 -
C. Carries out all database, monitoring, reporting and policy distribution functionality and
does not support the management of CSIDS sensors.
D. Stores all system configuration data and summary audit records, generates on-demand
or scheduled system reports, compiles global policy down into device specific rules.
Answer: D
QUESTION NO: 5
What happens to the old files when a new configuration file is created?
A. The old file is deleted from the system.
B. The old file is closed and transferred to an archive directory.
C. The old log file remains opened until the administrator deletes it.
D. The old log file remains opened until it has reached 1 GB of data.
Answer: D
By default, log files will be archived and a new one is created when the active log file reaches
1 gb or after 60 minutes have past, which ever comes first
- Cisco Secure Intrusion Detection System 4 chap C page 44
QUESTION NO: 6
What is context based signature?
A. Signature triggered by single packets.
B. Signature triggered by series of multiple packets.
C. Signature triggered by data contained in packet payloads.
D. Signature triggered by data contained in packet headers.
Answer: D
Context based cheking checks for ip header not the data. Content based checking checks for
the data.
QUESTION NO: 7
In the 3000 series which TCP signature occurs when one host searched for multiple TCP
services on a single host?
A. Mail attack
B. TCP Port scan
C. TCP Host sweep
D. TCP Traffic Record